Job Description :

VULNERABILITY MANAGER

12+ MONTHS CONTRACT

100% REMOTE

INTERVIEW :- PHONE

MUST PROVIDE 5 YEARS OF US WORKING EXP

Candidate Description
The preferred candidate will have a total of 10 years' experience in the Information Technology/ Information Security industry, with minimum of 5 years of experience performing vulnerability scanning or penetration testing activities.
This role is a blend between specific technology engineering and process / resource management. The candidate must be able to demonstrate ability to install, manage and maintain vulnerability scanning technologies in a cloud environment and the ability to manage the remediation of identified vulnerabilities through coordinating the efforts of teammates and customer resources. The candidate will perform assessments of systems and networks within the network environment or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Demonstrated experience in supporting vulnerability scanning technologies as an engineer is REQUIRED.
This position supports a customer out of AUSTIN, TX, and will support the customer's 24x7 Security Operations Center (SOC). This position is in direct support (on-site at customer facilities) of an CLIENT customer in the government sector. CLIENT is providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC) including Tier 1 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR).
Responsibilities
Provision security tools for customer.
Develop and maintain configuration for a suite of endpoint protection technologies.
Help determine tactics, techniques, and procedures (TTPs) for security tools.
Recommend computing environment vulnerability corrections.
Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
Prepare vulnerability reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
Ability to analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
Ability to work with provided security policies to design and implement network and security rules and configurations across various security platforms.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Recommend computing environment vulnerability corrections.
Create and document procedures and work instructions for use by the SOC staff (Tier 2 through Tier 3).
Train and mentor others as needed.
Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
Candidate Requirements
Candidate should have strong communications skills, both written and verbal, be comfortable presenting information to teammates, customer technical personnel and CLIENT Leads and Managers.
The preferred candidate is REQUIRED to have:
Ten (10) years of Security Incident Response, Security Operations Center, and/or threat analysis experience.
Demonstrated experience using either an Enterprise/MSSP and or cloud Security SIEM technologies as an analyst.
Ability to support and work across multiple customer and bespoke systems.
Must be able to pass a CJIS background check process and other background checks to comply with customers contracts.
Complete basic safety and security training to meet the customer requirements.
Ability to work a rotating shift and on-call schedule as required.
CompTIA Security + certification or equivalent/higher
Selected candidates must be US Citizens.

Candidate Preferred Requirements
The Preferred candidate holding one or more of the industry certifications will be a plus

Certified Ethic Hacker (CEH) or equivalent
Certified Incident Handler (GCIH or ECIH)
Splunk Power User Certification
Other Certs - such as CompTIA Networking+, any Cloud Certifications, Devo, Splunk, Azure Sentinel
Qualifying Experience and Attributes
Ability to configure and troubleshoot vulnerability scanning systems and the networks on which they run.
Direct experience managing and troubleshooting one or more vulnerability scanning products.
Experience managing vulnerability scanning solutions both on premise and in the cloud.
Strong knowledge of Virtualized or Cloud Computing.
Working knowledge of Windows Active Directory Domains
Working Knowledge of various Linux OS
Strong Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of application vulnerabilities.
Skill in conducting application vulnerability assessments.
Skill in performing impact/risk assessments.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
Knowledge of incident response and handling methodologies.
Knowledge of network traffic analysis methods.
Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of security system design tools, methods, and techniques.
Knowledge of what constitutes a network attack and it's relationship to both threats and vulnerabilities.
Knowledge of defense-in-depth principles and network security architecture.
Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
Knowledge of cyber defense and information security policies, procedures, and regulations.
Knowledge of the common attack vectors on the network layer.
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
Signature implementation impact for viruses, malware, and attacks.
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of how to use network analysis tools to identify vulnerabilities.
Skill in using protocol analyzers.
Skill in recognizing and categorizing types of vulnerabilities and associated attacks.

             

Similar Jobs you may be interested in ..